Cybersecurity & AI Insights

Expert analysis from Ricnology

IBM API Connect CVE-2024-47106 CVSS 9.8 Flaw Disclosed
cybersecurity tech news security

IBM API Connect CVE-2024-47106 CVSS 9.8 Flaw Disclosed

IBM API Connect suffers from critical CVE-2024-47106 vulnerability with CVSS 9.8 severity rating, enabling remote attackers to execute arbitrary code through authentication bypass, affecting API management systems and requiring immediate patching

January 2, 2026 3 min read
DarkSpectre Browser Malware Campaign Targets 8.8M Users
cybersecurity tech news security

DarkSpectre Browser Malware Campaign Targets 8.8M Users

DarkSpectre browser extension malware campaign leverages Chrome, Edge, and Firefox extensions to distribute credential-stealing malware, compromising 8.8 million users globally through fake productivity and security tools

January 2, 2026 3 min read
Trust Wallet Chrome Hack Steals $8.5M via GitHub Access
cybersecurity tech news security

Trust Wallet Chrome Hack Steals $8.5M via GitHub Access

Trust Wallet Chrome extension compromised after attackers exploited exposed GitHub developer credentials in Shai-Hulud supply chain attack, injecting malicious code that drained $8.5 million in cryptocurrency from user wallets

January 2, 2026 3 min read
IBM API Connect CVE-2025-13915 CVSS 9.8 Flaw Disclosed
cybersecurity tech news security

IBM API Connect CVE-2025-13915 CVSS 9.8 Flaw Disclosed

IBM API Connect CVE-2025-13915 authentication bypass vulnerability rated CVSS 9.8 enables remote attackers to gain unauthorized system access through authentication mechanism exploitation, affecting enterprise API management platforms and requiring immediate patching

January 1, 2026 4 min read
DarkSpectre Campaign Compromises Millions via Extensions
cybersecurity tech news security

DarkSpectre Campaign Compromises Millions via Extensions

DarkSpectre malware campaign compromises millions of users through malicious browser extensions distributed across Chrome and Edge, stealing credentials and cryptocurrency wallet data from infected systems through silent background operations

January 1, 2026 3 min read
Trust Wallet Supply Chain Attack Results in $8.5M Loss
cybersecurity tech news security

Trust Wallet Supply Chain Attack Results in $8.5M Loss

Trust Wallet Chrome extension targeted in Shai-Hulud supply chain attack after exposed GitHub developer credentials allowed attackers to inject malicious code, resulting in $8.5 million cryptocurrency theft from user wallets

January 1, 2026 3 min read
MacSync Malware Bypasses Gatekeeper Using Signed Apps
cybersecurity tech news security

MacSync Malware Bypasses Gatekeeper Using Signed Apps

MacSync information stealer bypasses macOS Gatekeeper protections through digitally signed and notarized applications, masquerading as legitimate messaging software while exfiltrating credentials and cryptocurrency wallets from infected systems

December 31, 2025 3 min read
Rey's Scattered LAPSUS$ Hunters Role Exposed by Researchers
cybersecurity tech news security

Rey's Scattered LAPSUS$ Hunters Role Exposed by Researchers

Security researchers expose Rey's leadership role coordinating Scattered LAPSUS$ Hunters cybercrime operations, revealing infrastructure management, attack planning, and social engineering tactics across multi-million dollar breaches

December 31, 2025 3 min read
U.S. Lifts Sanctions on Five Intellexa Spyware Associates
cybersecurity tech news security

U.S. Lifts Sanctions on Five Intellexa Spyware Associates

U.S. Treasury removes sanctions from five individuals linked to Intellexa commercial spyware operations, reversing previous penalties imposed for mercenary surveillance software development and deployment against journalists and government officials

December 31, 2025 3 min read
Nomani Fraud Campaign Uses AI Deepfakes Across Platforms
cybersecurity tech news security

Nomani Fraud Campaign Uses AI Deepfakes Across Platforms

Nomani investment fraud expands 62% leveraging AI-generated celebrity deepfakes across Facebook and YouTube, with ESET blocking 64,000 malicious URLs distributing cryptocurrency scams through fake endorsements on social media

December 30, 2025 3 min read
MacSync Stealer Evades Detection via Apple Notarization
cybersecurity tech news security

MacSync Stealer Evades Detection via Apple Notarization

MacSync information stealer variant exploits Apple's notarization framework, distributing through digitally signed Swift applications disguised as messaging tools to bypass Gatekeeper and exfiltrate credentials and crypto wallets

December 30, 2025 3 min read
Rey Identified as Scattered LAPSUS$ Hunters Key Operator
cybersecurity tech news security

Rey Identified as Scattered LAPSUS$ Hunters Key Operator

Digital investigation identifies Rey as central operator managing Scattered LAPSUS$ Hunters cybercrime infrastructure, coordinating data theft operations and overseeing social engineering attacks against enterprise targets

December 30, 2025 3 min read